Please enable JavaScript.
Coggle requires JavaScript to display documents.
MCA Security (Security techniques (Encryption (Cons (Requires higher…
MCA Security
Security techniques
Random Neural Network
hardware-based authorisation
Key generation
Encryption
Cons
Requires higher processing power
Pros
Data can not be read form outside
Limitations
Processor
Power efficiency
lightweight devices
Resource limitations
Protocols
RFID
WIFI
NFC
bluetooth
IOT Layers
Prescription layer
network layer
application layer
Threats
Data manipulation
Frameworks
CISCO